Sök:

Sökresultat:

1704 Uppsatser om Denied access to the classroom - Sida 49 av 114

Matteklipp på nätet : Ett stöd i matematikundervisningen

 ABSTRACTThis master thesis defines a new concept ? Math Videos on the Net. The term refers to short,educational videos of mathematics that are freely available on the internet. The videos aredesigned to offer a complement to other course material for a specific element of a specific mathcourse and are directed to the target group of students studying the latter. Within this work, MathVideos on the Net have been created for the Swedish upper secondary school courses Matematik1b and 1c.The study aims to describe, analyze and interpret whether, and if so, how Math Videos on theNet can help support the work of teachers and students? development of knowledge in the firstmathematics course of the Swedish upper secondary school.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Ungdomars motivation till att lära sig programmering genom introduktionskurser

Today there is a shortage of skilled IT-technicians in Sweden. It is approximated that Swedish companies can hire 31 000 IT-technicians in 2015 and the need seems to increase in the coming years. One proposed solution to this problem is to make programming more desirable to youths. In this study we attempt to investigate the effects of an introductory course in computer science on youths? (16-17 years old) in a classroom setting.

Centraliserad styrning av åtkomstlistor

Can the Danish "Aftalesystemet", a system with the intention to simplify the use of services within health care, be used in Sweden? This project has investigated the possibility by installing and testing the system and explored its functions to detect any eventual problems. Analyses were made of the system's graphical part and the underlying code to see in greater detail how the communication between units occurred, since no actual documentation of it existed. Discussions with the developers took place regarding how the current system works and how further development should continue. In order to test the system, a completely virtual environment was used.

Ett lastbilsdäck är svart och runt, eller? : En kvalitativ studie om drivkrafterna bakom en optimal däckhantering på åkerier i Mellansverige.

Individual adaption to the student´s needs is a recurring main theme in the new Swedish curriculum (Lgr11). The purpose of this qualitative study is to examine how teachers work with individual adjustment for students with reading and writing difficulties. The study was based on five questions;In what way do teachers organize their teaching in the classroom individually for students with reading and writing difficulties?What methods do they use for student´s with reading and writing difficulties?What difficulties do they encounter in their teaching?How do the teachers reason to curriculum goals regarding individual adaptions?How do they think about their own knowledge regarding reading- and writing difficulties and dyslexia?The method for my study was qualitative interviews. Five teachers were interviewed in semi-structured interviews.

SMS för personer med kognitiva och kommunikativa funktionsnedsättningar ? en intervjustudie av användares upplevelser

Current technology offers many possibilities for remotecommunication. Nevertheless, people with cognitive and communicativedisabilities have limited access to common communication technology like textmessaging via a mobile phone. This study is part of the project Text messagingwith picture symbols - a possibility for AAC users and people with cognitiveimpairments. Semi structured interviews were used to investigate three menand four women?s experiences of using Windows mobiles with adaptedfunctions for text messaging.

Högtempererat borrhålslager för fjärrvärme

The district heating load is seasonally dependent, with a low load during periods of high ambient temperature. Thermal energy storage (TES) has the potential to shift heating loads from winter to summer, thus reducing cost and environmental impact of District Heat production. In this study, a concept of high temperature borehole thermal energy storage (HT-BTES) together with a pellet heating plant for temperature boost, is presented and evaluated by its technical limitations, its ability to supply heat, its function within the district heating system, as well as its environmental impact and economic viability in Gothenburg, Sweden, a city with access to high quantities of waste heat.The concept has proven potentially environmentally friendly and potentially profitable if its design is balanced to achieve a good enough supply temperature from the HT-BTES. The size of the heat storage, the distance between boreholes and low borehole thermal resistance are key parameters to achieve high temperature. Profitability increases if a location with lower temperature demand, as well as risk of future shortage of supply, can be met.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Ordningsbetyget : för och nackdelar

The main aim of this essay was to find out what kind of advantages and/or disadvantages giving marks in pupils order and behaviour can cause for their development of knowledge and emotional and social skills. We let teachers answer a questionnaire about giving marks in pupils order and behaviour. We have also interviewed one person that was involved to prepare the latest curriculum in 1994, Lpo 94, and they decided that Swedish teachers do not have the right competence to judge ones order or behaviour. We have also looked at different theories about: mark as motivation, mark as information, mark as control, self-fulfilling prophecy, emotional disorders and gender, with whom we analyse the fact to give marks in order and behaviour.What we can establish is that giving marks in pupils order and behaviour seems to bring more disadvantages than advantages. Boys mature later than girls and have there for, in general, not as good behaviour as the girls have in the classroom.

Barn och sorg

The purpose of this study is to highlight some aspects of the increased usage of tablets in preschool environments by answering the questions: what does the tablet become in the preschool environment, how much freedom does the children have over its usage.To answer these questions a series of observations were made at two different preschools. The observations were then complemented by interviews with teachers at the same preschools.This qualitative study focuses on some of the didactic questions regarding the tablets, based on a theoretical framework that is within the design-oriented perspective; which addresses the children's? autonomy, the institutional framework and affordance.Our conclusion is that the tablet?s introduction in the preschool has helped the teachers in numerous parts of their documentation, but we can also see that the children's opportunities to make choices regarding the tablet are more limited than with any other resource on the preschool. In our results we also see that when the children get access to the tablet they receive a learning experience, which among other things, strengthens their language skills and their social interaction with each other..

Bibliotekarien som distansarbetare? : förutsättningar för bibliotekarien att utföra sina funktioner på distans

We studied how librarians would adapt to telework, the performance of job responsibilitiesfrom home. We found'that all duties could be accomplished. but to varied extents.Computerbased searches, interlibrary loans, acquisitions, indexing and telephone referenceservices are the duties most likely to adapt to telework whereas cataloguing andclassification probably are best performed in the ordinary workplace.Most duties would demand access to technical means of assistance when performed fromhome. Connections to the library's local network, directly or via modem, are requiredbecause it is unrealistic to expect librarians to telework with fewer tools than theyordinarily have available. Although librarians generally believe that teleworking will nothave a large irnpact on the operation of the library, most would like to telework.Whether teleworking is a viable strategy depends on the characteristics of the duties, thelibrarian's desire to telework, but also on the size of the library, the size of its staff, thelibrary's activities, and how work is distributed between librarians..

Icke utövande Kvinnors relation till styrketräning : Om Kunskap, Fördomar, Arbetsgivaruppmuntran och Manslukt

In this study it has been investigated what is missing in non-strength training women to begin exercise regular strength training. It has also examined the level of knowledge about the health benefits and the employer's encouragement to maintain good health. The study was designed in a qualitative methodology and data collection was designed in form of semi-structured interviews. Six women were interviewed between the ages 22-51år. The results showed that women possessed a very low level of knowledge about strength training and also fears and prejudices existed among them.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

?Uppstår förvirring, uppstår kaos? : Några grundskolelärares upplevelser kring samspelet mellan disciplin, planering och struktur i klassrummet

Syftet med föreliggande studie var att förstå några grundskolelärares upplevelser av hur disciplin samspelar med planering och struktur i klassrummet samt hur de upplevde att de genom handling kan påverka oordning. Studien ämnar även undersöka huruvida grundskolelärare upplever att de i sin utbildning lärt sig att motivera elever och hantera oordning. Urvalet bestod utav sex lärare på grundskolans senare år som varit yrkes-verksamma mellan 1 och 27 år. En halvstrukturerad livsvärldsintervju användes där en intervjuguide med föreslagna frågor hade förberetts. Av resultatet framkom det att de intervjuade lärarna upplevde att disciplinen i klassrummet var relativt god, då de generellt sett upplevde att ordningsreglerna följdes av eleverna.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

<- Föregående sida 49 Nästa sida ->